Kali Linux

Top 7 Best Open Source SQL Injection Tools – 2019

SQL injection is a standout amongst the most widely recognised attacks against web applications. Here is the list of Best…

5 years ago

SUDO KILLER : A Tool To Identify & Exploit Sudo Rules’ Misconfigurations & Vulnerabilities Within Sudo

SUDO KILLER is a tool which help to abuse SUDO in different ways and with the main objective of performing…

5 years ago

Hvazard : Remove Short Passwords & Duplicates, Change Lowercase To Uppercase & Reverse, Combine Wordlists

HVAZARD dictionary modifier remove short passwords & duplicates, change lowercase to uppercase & reverse, combine wordlists! Manual & Explaination d…

5 years ago

GitGot – Semi-Automated, Feedback-Driven Tool To Rapidly Search Through Troves Of Public Data On GitHub For Sensitive Secrets

GitGot is a semi-automated, feedback-driven tool to empower users to rapidly search through troves of public data on GitHub for…

5 years ago

Git Hound – Find Exposed Keys Across GitHub Using Code Search Keywords

Git Hound makes it easy to find exposed APi keys on GitHub using pattern matching, targetted querying, and a scoring…

5 years ago

A Closer Look At The Brushless DC Electric Motor

The brushless DC electric motor (also known as BL motor, BLDC motor or electronically commutated motor) is one of the…

5 years ago

Kali NetHunter App Store Dedicated to Free Security Apps

The Kali NetHunter App Store is an installable catalogue of Android applications for penetration testing and forensics. The client makes…

5 years ago

Userrecon PY : Recognition Usernames In 187 Social Networks

Userrecon PY is a tool used to recognise usernames in 187 social networks. So first of all let us have…

5 years ago

Explo : Human & Machine Readable Web Vulnerability Testing Format

Explo is a simple tool to describe web security issues in a human and machine readable format. By defining a…

5 years ago

Blisqy : Exploit Time-based Blind-SQL Injection In HTTP-Headers

Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom…

5 years ago